How important to you is it that vendors have readily available security compliance documentation when you begin the evaluation process?
Very Important51%
Somewhat Important44%
Not Important4%
220 PARTICIPANTS
Very Important51%
Somewhat Important44%
Not Important4%
Insider threats – rogue admins24%
Encrypting my data39%
Deleting my backup copies13%
Resident malware18%
Data theft – data exfiltration5%
Other
Early Stages - the security activities haven't been planned/deployed yet.17%
Middle stage - we've planned security activities, but we've only partially deployed them.59%
Late-middle stage - we've deployed the majority of our security activities and it's keeping up with threats.19%
Mature stage - all security activities are deployed and are proactively detecting threats.3%
No selling.
No recruiting.
No self promotion.
Rules of EngagementFAQsPrivacy
© 2025 Gartner, Inc. and/or its affiliates. All rights reserved.
I find it interesting how important responders say it is compared to how often we all feel we are the first person in the world asking about security compliance from vendors...